{"id":"https://openalex.org/W2999537246","doi":"https://doi.org/10.1080/08874417.2019.1688731","title":"Big Data Analytics in Cyber Security: Network Traffic and Attacks","display_name":"Big Data Analytics in Cyber Security: Network Traffic and Attacks","publication_year":2020,"publication_date":"2020-01-08","ids":{"openalex":"https://openalex.org/W2999537246","doi":"https://doi.org/10.1080/08874417.2019.1688731","mag":"2999537246"},"language":"en","primary_location":{"id":"doi:10.1080/08874417.2019.1688731","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08874417.2019.1688731","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100424670","display_name":"Lidong Wang","orcid":"https://orcid.org/0000-0003-3923-849X"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lidong Wang","raw_affiliation_strings":["Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089666998","display_name":"Randy Jones","orcid":"https://orcid.org/0000-0002-2739-5132"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Randy Jones","raw_affiliation_strings":["Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100424670"],"corresponding_institution_ids":["https://openalex.org/I99041443"],"apc_list":null,"apc_paid":null,"fwci":5.3144,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.95749059,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"61","issue":"5","first_page":"410","last_page":"417"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7494242191314697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7339767217636108},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.6994292736053467},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6454852819442749},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5963245630264282},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.593765914440155},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.45749080181121826},{"id":"https://openalex.org/keywords/data-analysis","display_name":"Data analysis","score":0.457007497549057},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.44670072197914124},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4271990656852722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3738003969192505},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11012119054794312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1073254644870758}],"concepts":[{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7494242191314697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7339767217636108},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.6994292736053467},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6454852819442749},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5963245630264282},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.593765914440155},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.45749080181121826},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.457007497549057},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.44670072197914124},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4271990656852722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3738003969192505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11012119054794312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1073254644870758}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/08874417.2019.1688731","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08874417.2019.1688731","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1542270631","https://openalex.org/W1610496399","https://openalex.org/W2006703696","https://openalex.org/W2139836766","https://openalex.org/W2140190241","https://openalex.org/W2318316822","https://openalex.org/W2602948783","https://openalex.org/W2781489559","https://openalex.org/W2864283861","https://openalex.org/W2902088493","https://openalex.org/W2907177309","https://openalex.org/W2964044134","https://openalex.org/W2970172234","https://openalex.org/W2972084444","https://openalex.org/W4212943589","https://openalex.org/W4242758220","https://openalex.org/W4244089844","https://openalex.org/W4245729972","https://openalex.org/W4366658060"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W4226266853","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W4210252074","https://openalex.org/W3157271777"],"abstract_inverted_index":{"Network":[0,13],"attacks,":[1],"intrusion":[2,5,27],"detection,":[3,88],"and":[4,15,32,42,51,61,78,84,89,112],"prevention":[6],"are":[7,70,93,119],"important":[8],"topics":[9],"in":[10,26,48],"cyber":[11],"security.":[12],"flows":[14],"system":[16],"events":[17],"generate":[18],"big":[19,45],"data,":[20],"which":[21],"often":[22],"leads":[23],"to":[24],"challenges":[25],"detection":[28,83],"with":[29,54,72],"high":[30],"efficiency":[31],"good":[33],"accuracy.":[34],"This":[35],"paper":[36],"focuses":[37],"on":[38,117],"the":[39,73,107],"\u2018Volume\u2019,":[40],"\u2018Veracity\u2019,":[41],"\u2018Variety\u2019":[43],"of":[44,75,98,110],"data":[46,56,60,63,90],"characteristics":[47],"network":[49],"traffic":[50],"attacks.":[52],"Datasets":[53],"various":[55,101],"types":[57],"including":[58],"numerical":[59],"categorical":[62],"(such":[64],"as":[65],"status":[66],"or":[67],"flag":[68],"data)":[69],"analyzed":[71],"help":[74],"R":[76],"language":[77],"its":[79],"functions.":[80],"Data":[81],"duplicates":[82],"removal,":[85],"missing":[86],"values":[87],"quality":[91],"analysis":[92,97,109,115],"also":[94,120],"performed.":[95,121],"The":[96],"masquerades":[99],"for":[100],"users":[102],"is":[103],"conducted.":[104],"In":[105],"addition,":[106],"correlation":[108],"variables":[111],"a":[113],"clustering":[114],"based":[116],"k-means":[118]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
